|
|
|
|
|
|
|
Features
- Security with embedded firewall and whitelist remote access control
- End-to-end data encryption
- Auto virtual IP mapping eliminates the need for field IP management
- Transparent tunnels suitable for existing software tools
- Flexibility for defining the relation between remote connections
|
|
|
|
|
|
|